AustLII Home | Databases | WorldLII | Search | Feedback

Edited Legal Collections Data

You are here:  AustLII >> Databases >> Edited Legal Collections Data >> 2013 >> [2013] ELECD 1291

Database Search | Name Search | Recent Articles | Noteup | LawCite | Help

Abbott, Joshua W. --- "Network security agreements: communications technology governance by other means" [2013] ELECD 1291; in Marchant, E. Gary; Abbott, W. Kenneth; Allenby, Braden (eds), "Innovative Governance Models for Emerging Technologies" (Edward Elgar Publishing, 2013) 214

Book Title: Innovative Governance Models for Emerging Technologies

Editor(s): Marchant, E. Gary; Abbott, W. Kenneth; Allenby, Braden

Publisher: Edward Elgar Publishing

ISBN (hard cover): 9781782545637

Section: Chapter 11

Section Title: Network security agreements: communications technology governance by other means

Author(s): Abbott, Joshua W.

Number of pages: 21

Abstract/Description:

It has been said we live in the “Communications Age” – a portentous assertion when in other named “ages” (from iron and bronze to nuclear), those who controlled or most effectively used the eponymous technology attained economic, military, and political ascendancy. If this, then, is the Communications Age, governments can be expected to seek effective governance of communications technology and infrastructure as a paramount objective. Indeed, media reports have increasingly depicted lawmakers and analysts fretting over such matters as Internet freedom, online privacy, and various “cyber” issues, including cybersecurity, cybercrime, and cyberwar. With the rapid changes in information and communication technologies, ensuring the security of communication networks presents a singular challenge. The question is how the government can most effectively accomplish the goal of securing the nation’s networks. Which governance model would be best suited to engage network operators in laying the conditions necessary for meeting that goal? Following a traditional form of governance, Congress might delegate overall responsibility for the problem to a single regulatory agency. That agency could then investigate all the relevant information, seek public input, and eventually promulgate generally applicable rules, to which network operators would be legally required to adhere. Such regulatory processes, however, can be exceedingly slow and inflexible, especially for rapidly evolving technologies. To secure the nation’s communications infrastructure, US federal agencies have improvised an alternative approach – one less formal and more adaptive – involving the use of network security agreements.


AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.austlii.edu.au/au/journals/ELECD/2013/1291.html